Showing 61 - 80 results of 498 for search '"homomorphic encryption"', query time: 0.09s Refine Results
  1. 61
  2. 62
  3. 63

    SoK: Fully Homomorphic Encryption over the [Discretized] Torus by Marc Joye

    Published 2022-08-01
    Subjects: “…Fully homomorphic encryption…”
    Get full text
    Article
  4. 64
  5. 65
  6. 66

    Cryptanalysis of the MORE symmetric key fully homomorphic encryption scheme by Tsaban Boaz, Lifshitz Noam

    Published 2015-06-01
    Subjects: “…fully homomorphic encryption…”
    Get full text
    Article
  7. 67
  8. 68
  9. 69

    Towards an efficient LWE‐based fully homomorphic encryption scheme by Uddipana Dowerah, Srinivasan Krishnaswamy

    Published 2022-07-01
    “…Abstract The security of most early fully homomorphic encryption schemes was based on the hardness of the Learning with Errors (LWE) problem. …”
    Get full text
    Article
  10. 70
  11. 71

    SoK: Fully Homomorphic Encryption over the [Discretized] Torus by Marc Joye

    Published 2022-08-01
    Subjects: “…Fully homomorphic encryption…”
    Get full text
    Article
  12. 72
  13. 73

    Designing a Programmable Hardware Accelerator for Fully Homomorphic Encryption by Feldmann, Axel S.

    Published 2022
    “…Fully Homomorphic Encryption (FHE) allows computing on encrypted data, enabling secure offloading of computation to untrusted servers. …”
    Get full text
    Thesis
  14. 74

    A Tensor Compiler for Simple and EfficientFully Homomorphic Encryption by Krastev, Aleksandar

    Published 2023
    “…Fully Homomorphic Encryption (FHE) enables computing on encrypted data, letting clients securely offload computation to untrusted servers. …”
    Get full text
    Thesis
  15. 75
  16. 76

    Privacy-aware quadratic optimization using partially homomorphic encryption by Shoukry, Y, Gatsis, K, Alanwar, A, Pappas, GJ, Seshia, SA, Srivastava, M, Tabuada, P

    Published 2016
    “…We propose a privacy-preserving protocol based on partially homomorphic encryption where each agent encrypts its own information before sending it to an untrusted cloud computing infrastructure. …”
    Conference item
  17. 77
  18. 78
  19. 79
  20. 80